Agentic AI as a Cybersecurity Attack Surface: Threats, Exploits, and Defenses in Runtime Supply Chains Authors: Xiaochong Jiang, Shiqi Yang, Wenting Yang, Yichen Liu, Cheng Ji | Published: 2026-02-23 2026.02.23 文献データベース
Red-Teaming Claude Opus and ChatGPT-based Security Advisors for Trusted Execution Environments Authors: Kunal Mukherjee | Published: 2026-02-23 2026.02.23 文献データベース
Jolt Atlas: Verifiable Inference via Lookup Arguments in Zero Knowledge Authors: Wyatt Benno, Alberto Centelles, Antoine Douchet, Khalil Gibran | Published: 2026-02-19 2026.02.19 文献データベース
What Breaks Embodied AI Security:LLM Vulnerabilities, CPS Flaws,or Something Else? Authors: Boyang Ma, Hechuan Guo, Peizhuo Lv, Minghui Xu, Xuelong Dai, YeChao Zhang, Yijun Yang, Yue Zhang | Published: 2026-02-19 2026.02.19 文献データベース
Privacy-Preserving Mechanisms Enable Cheap Verifiable Inference of LLMs Authors: Arka Pal, Louai Zahran, William Gvozdjak, Akilesh Potti, Micah Goldblum | Published: 2026-02-19 2026.02.19 文献データベース
Fail-Closed Alignment for Large Language Models Authors: Zachary Coalson, Beth Sohler, Aiden Gabriel, Sanghyun Hong | Published: 2026-02-19 2026.02.19 文献データベース
Sequential Membership Inference Attacks Authors: Thomas Michel, Debabrota Basu, Emilie Kaufmann | Published: 2026-02-18 2026.02.18 文献データベース
Recursive language models for jailbreak detection: a procedural defense for tool-augmented agents Authors: Doron Shavit | Published: 2026-02-18 2026.02.18 文献データベース
Phase-Based Bit Commitment Protocol Authors: Janis Nötzel, Anshul Singhal, Peter van Loock | Published: 2026-02-18 2026.02.18 文献データベース
Mind the Gap: Evaluating LLMs for High-Level Malicious Package Detection vs. Fine-Grained Indicator Identification Authors: Ahmed Ryan, Ibrahim Khalil, Abdullah Al Jahid, Md Erfan, Akond Ashfaque Ur Rahman, Md Rayhanur Rahman | Published: 2026-02-18 2026.02.18 文献データベース